> it just proxies whatever normal public dns you tell it to....

Presumably they seed the namecoin table with DNS records and use those
instead when they exist? I don't know whether those can be expired
efficiently.

> As for on the current web making sure you're sending
> your password to the right person, no one is intercepting
> your credit card details, who you're talking to isn't being
> tracked by anyone but the site itself, etc... well okTurtles
> just leaves that up to the same certificate authorities
> they don't trust....

It seems like they would take the next logical step and verify
namecoin-cached public key fingerprints of both the site and the
certificate before initiating a traditional SSL connection (and/or
better revocation support.)

_______________________________________________
Wikitech-l mailing list
Wikitech-l@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/wikitech-l

Reply via email to